Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Frequent item set mining method based on localized differential privacy

A technology of frequent itemset mining and differential privacy, applied in special data processing applications, instruments, electrical digital data processing, etc., can solve the problems of reduced quality of mining results, reduced privacy protection intensity, high communication costs, etc., to reduce privacy budget Consumption and communication costs, reducing the privacy budget segmentation problem, and improving the effect of data accuracy

Pending Publication Date: 2021-10-29
SOUTHEAST UNIV +1
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The existing localized differential privacy-preserving frequent itemset mining methods mainly have the following problems: (1) The traditional sampling-based frequent itemset mining method only samples one value at a time, and needs to interact with the client multiple times to obtain relevant data features, communication The cost is high, leading to an increase in the privacy budget and reducing the intensity of privacy protection; (2) The signal-to-noise ratio of the localized differential privacy data perturbation protocol is relatively large, and multi-dimensional data will generate a variety of different data combinations during data interaction. Every attribute will be perturbed, and the combination will undoubtedly amplify the noise in the perturbed data, reducing data availability; (3) The correlation of attributes in multidimensional data cannot be ignored, and the existing localized differential privacy frequent item mining technology is directly applied to Multidimensional data can lead to lower quality mining results

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Frequent item set mining method based on localized differential privacy
  • Frequent item set mining method based on localized differential privacy
  • Frequent item set mining method based on localized differential privacy

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0020] Example 1: The number of users is N=10, and the data sets it owns are as follows. For the convenience of description, all attribute values ​​are replaced by numbers:

[0021]

[0022] Step 1: As can be seen from the above table, the user has 4 attributes, and each attribute has 2 attribute values, so the value range of the data set Ω 1 ={0,1},Ω 2 ={2,3},Ω 3 ={4,5},Ω 4 ={6,7}, m=8. For convenience, the support threshold δ=0.015 is defined, and all attribute values ​​are directly converted to their corresponding binary forms, for example, 5=101 2 , substituting the f array calculation function to get the parameter array of the perturbation function:

[0023] f=[0.5,0.5,0.5,0.5]

[0024] Substituting the disturbance function into the calculation can obtain the form of the corresponding disturbance function:

[0025]

[0026] Step 2: Use random responses to perturb the user data set to obtain the perturbed data set As follows:

[0027]

[0028]

[002...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a frequent item set mining method based on localized differential privacy, which comprises the following steps: 1, a local data protection stage: generating a disturbance parameter array according to the conditions of 0 and 1 on each bit in a 0 / 1 string after coding by adopting a self-adaptive coding strategy, and disturbing data by applying an immediate response technology according to the disturbance array; 2, a joint probability estimation stage: learning model parameters of the disturbed data through a hidden Markov model, and calculating and estimating a joint probability by using the parameters; and 3, a frequent item set discovery stage: constructing a probability dependency graph corresponding to the original data according to a result of the step 2, and searching a frequent item set in the probability graph through a frequent item set prior principle. According to the method, frequent item set mining considering data privacy of each user in a multi-user-side distribution environment can be supported.

Description

technical field [0001] The invention relates to a privacy protection data mining method, in particular to a frequent item set mining method based on localized differential privacy. Background technique [0002] In recent years, privacy-preserving frequent itemset mining has become a hot topic for researchers. Differential privacy has become a hot technology in the field of privacy protection because of its strict mathematical definition of protection effect and the need not to care about the background knowledge of the attacker. The traditional centralized differential privacy technology centralizes data to a third-party data center, but it is often difficult to find a trusted third-party data center in practical applications, so localized differential privacy technology is usually used. The distributed application scenario of the third-party data center protects the user's private data by perturbing the user's sensitive data at the user end. defined as follows [0003] D...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06K9/62G06F16/2458
CPCG06F21/6245G06F16/2465G06F18/295
Inventor 倪巍伟吴尔立吴宁
Owner SOUTHEAST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products